Skip to main content
multithr3at3d's user avatar
multithr3at3d's user avatar
multithr3at3d's user avatar
multithr3at3d
  • Member for 8 years, 8 months
  • Last seen this week
71 votes
Accepted

How do universities and schools securely sync passwords between multiple services?

68 votes
Accepted

Security risks of fetching user-supplied URLs

67 votes

Why are stored procedures and prepared statements the preferred modern methods for preventing SQL Injection over mysql real escape string() function

56 votes
Accepted

What's the difference between end-to-end and regular TLS encryption?

51 votes

What could an "<img src=" XSS do?

31 votes
Accepted

Eduroam requires installation of a CA Certificate - can they decrypt TLS traffic?

27 votes

Protecting firmware .bin from reverse engineering

26 votes

Why has Ubuntu 18.04 moved back to insecure Xorg?

20 votes

Bypass MAC address internet time filtering?

16 votes

Where should I store a username during a password reset?

14 votes

Do I need to encrypt connections inside a corporate network?

12 votes

HTTP: how likely are you to be compromised by using it just once?

11 votes
Accepted

Encrypt folder on Linux that can only be decrypted on that specific OS and device

11 votes

Is a public /admin route a security flaw?

10 votes
Accepted

How does SSH know which public key to use from authorized_keys?

9 votes

Is it possible to identify my cellphone model if I connect to wifi?

9 votes
Accepted

Would MAC filtering protect against KRACK?

9 votes
Accepted

How does malware get past NAT routers?

9 votes
Accepted

Why can I ping a server, but nmap normal scan cannot see the host?

8 votes
Accepted

Questions about TLS handshaking process

8 votes
Accepted

ARP spoofing with Scapy. How does Scapy reroute traffic?

7 votes
Accepted

How to ensure the third party CDN is secure (and stays secure)?

7 votes
Accepted

Could a cracked password run as a command on the attacker's system?

7 votes
Accepted

How does proxychains avoid DNS leaks?

6 votes

When will TLS 1.2 be deprecated?

6 votes
Accepted

Do you need DNSSEC if you use HSTS?

6 votes
Accepted

Is it safe to leave MySQL root user without a password if it uses auth_socket?

6 votes
Accepted

Why is forwarding port 80 more insecure than the others?

6 votes
Accepted

Password protection for NetCat shell?

6 votes
Accepted

Are security keys with touch requirements more secure than those without?

1
2 3 4 5
14